In today’s cybersecurity world, we can no longer hide behind the assumption that business will never be compromised. Institutions must ensure adequate investments in security are made, not only in prevention, but in the detection of threats and effective incident response as well. With data breaches on the rise, it’s time to sharpen your institution’s response procedures and improve your Incident Response Plan. In this session, core steps required for most incidents will be highlighted and specialized components for DDOS, malware, ransomware, CATO, and unauthorized access incident types will be examined. Explore the importance of incorporating forensic analysis procedures into your standard procedures to better address emerging threats and decrease liability.
The following areas will be discussed with attendees to ensure institutions are prepared to have a successful response if prevention measures fail:
- Internal communications
- Incident containment, eradication, and recovery
- External communications
- Integration of forensics
- Insider threats
Target Audience: Information security officer, IT manager, risk officer